How to Make Everyone Hate You – Communication Skills for Security and Governance Professionals Todd Fitzgerald, CISA,CISM, CGEIT, CRISC, PMP, ISO27000, CISSP, ITILv3f Director, Global Information Security ManpowerGroup, Milwaukee, WI Session 124 & 134 11/14/12 1-3:15 Las Vegas, NV Speaker Biography Todd Fitzgerald, CISSP, CISA, CISM, CRISC, CGEIT,is the Director, Global Information Security for ManpowerGroup. He is responsible for providing strategic information security leadership, policy, direction and working closely with local country security teams supporting 4,000 offices in 82 countries and territories to ensure information asset protection and compliance with global laws and regulations. Fitzgerald authored the 2012 book, Information Security Governance Simplified: From the Boardroom to the Keyboard”, and co-authored the 2008 ISC2 Press Book Entitled CISO Leadership: Essential Principles for Success, along with numerous other chapters for security publications, including the Official ISC2 Guide to the CISSP CBK. Todd has spoken frequently and chaired national/international conferences for ISACA, CSI, ISSA, MISTI, COSAC, HIMSS, HIPAACOW, CMS and others. He has previously held senior information technology leadership positions with Fortune 500 organizations such as WellPoint (National Government Services), AstraZeneca (Zeneca), Syngenta, IMS Health, American Airlines and Blue Cross Blue Shield United of Wisconsin. About ManpowerGroup • World Leader in Innovative Workforce Solutions • Most Admired in Industry • $22 Billion Company, Fortune #138/500, NYSE:MAN • 4,000 Offices in 82 countries • 30,000 Employees • 65% of revenues outside the US • 3.5 Million placements in permanent, temporary and contract positions • World Headquarters – Milwaukee, WI A Little ‘Presentation Disclaimer’ … The opinions expressed are solely the opinions of Todd Fitzgerald and do not necessarily represent the opinions of his employer. You may or may not want to adopt the these concepts in your organization. Use a riskbased approach before attempting this at home. Today’s Objectives… • What Does My Age Have To Do With It ? • Who Do You Think You Are ? Who Are Those %$%#$! People That Work With Us? • Soft Stuff and My Body Ain’t Talkin! • Obama and Romney Are The Only Ones Who Care About Politics, Or Should We? What Does My AGE Have To Do With It ? Trends Changing the World of Work One Size Fits One Traditionalist Boomer Born 1928-1945 Born 1946-1960 Generation X Generation Y Re-Generation Born 1961-1979 Born 1980- 1995 Born 1996 - Each generation approaches work differently, shaped by the economic, social and political forces of their time ultimately forming their individual preferences. 7 | © 2011 Tamara J. Erickson and Moxie Insight. The United States Population Pyramid Source: International Data Base, U.S. Census Bureau Iconic Generational Moments Traditionalists: Born 1928 to 1945 Traditionalists shared experiences of the 1940s and 1950s in the United States: Allied military success in World War II The early days of the Cold War A wave of new technology Booming Post-War economy Growth of suburbs Increased availability of consumer goods © 2011 Tamara J. Erickson and Moxie Insight. All Rights Reserved. What Are The Implications For Communications (Work Approach, Technology, Verbal, Feedback Needs, Work/life Balance, Rewards) These Experiences Produce? Iconic Generational Moments Boomers: Born 1946 to 1960 Boomers shared experiences of the 1960s and 1970s in the United States: Kennedy’s “Camelot” Presidency The Cuban Missile Crisis Assassinations of Kennedy, King, and other idealistic leaders Vietnam Civil Rights Women’s liberation Widespread protests Watergate and Nixon’s resignation Lots of other Boomer teenagers! © 2011 Tamara J. Erickson and Moxie Insight. The 1967 Man of The Year What Are The Implications For Communications (Work Approach, Technology, Verbal, Feedback Needs, Work/life Balance, Rewards) These Experiences Produce? Iconic Generational Moments Generation X: Born 1961 to 1979 Generation X’s shared experiences of the late 1970s through the Mid-1990s in the United States: Troubled economy Widespread layoffs from reengineering Women entering the workforce Rising divorce rates Challenger shuttle disaster Era of “Greed is Good” CNN and electronic games The first Gulf War © 2011 Tamara J. Erickson and Moxie Insight. What Are The Implications For Communications (Work Approach, Technology, Verbal, Feedback Needs, Work/life Balance, Rewards) These Experiences Produce? Iconic Generational Moments Generation Y: Born 1980 to 1995 Generation Y Shared experiences of the Mid-1990s through the late 2000s in the United States: Terrorism: 9/11, World Trade Center, Oklahoma City School violence: Columbine Ubiquitous technology Clinton’s sexual indiscretions Working mothers Pro-child culture © 2011 Tamara J. Erickson and Moxie Insight. What Are The Implications For Communications (Work Approach, Technology, Verbal, Feedback Needs, Work/life Balance, Rewards) These Experiences Produce? $h*! Gen Y’s Say* Can I bring my iPhone, iPad and Mac to work and use this? Can I text my manager if I am sick rather than call in? Do I have to wear shoes to work? Do you drug test often? Do I have to show up each day? Can I friend my manager on Facebook once I get hired? How long will it take to become next CEO? Does your company have game room, nap room, sports team? Can I access Facebook and Twitter at work? Do I really need to be on time? Is it ok to be 15-30 late each day? *Not the Actual Name of the Survey Source: Workplace 2020 Important Differences Around the World The U.S. China Brazil Traditionalists Joiners Respectful Fiscally conservative Hard-working Idealistic Cautious Modest Respectful Risk-averse Boomers Competitive Anti-authoritarian Idealistic Authoritarian Loyal to the Party Work as service Consumers Politically cautious Idealistic Generation X Self-reliant Mistrustful Dedicated parents Sacrificing for the common good Dedicated children Self-reliant Wary Family-centric Generation Y Immediate Optimistic Digital natives Family-centric Immediate High self-esteem Digital natives Materialistic Immediate Optimistic Digital natives Financially driven For Example . . . © 2011 Tamara J. Erickson and Moxie Insight. All Rights Reserved. Gen Z Enters the Workplace in a Decade Shared experiences and predictions about their future work life: • They have grown up with shortages. – Energy – Water – Money • Their work life will be different – – – – – Technology will replace jobs faster. They will work for more women executives. Work will be more virtual and lonely. Their career(s) will be many and long. Their focus will be on renewal. The Shift, the future of work is already here, Moxie Insight World Map According to Land Distribution in 2011 Source: WorldMapper ManpowerGroup Proprietary Information World Map According to Population Distribution in 2050 Source: WorldMapper Leading a Multiple Generation Workforce Don’t Judge Appreciate Differences Build Trust Embrace Diversity Changing Workforce, Changing View of The World THEN • Cubicle Slavery • Job For Life • Personnel file at Big company • • • • Do What You Are Told Competence Corporation Peers Work with the same folks day in and day out • Become the boss (after 25 years) • Goal: Get through the day • Know the “ropes” Source: Tom Peters Essential Series “Talent”, 2005 NOW • • • • • • • • • • Free Agent Gig for Now Temp Assignments Do what you excel at Mastery Peers in my craft Shifting network of partners Be the boss (now) Goal: Get things done Learn to Bungee Jump The Generational Differences Will Impact Future Communications • Baby Boomers (1946-60) loyal, dependable, workaholics • Gen Xers (1961-1979) independent, reject rules • Gen Y (1980+) short attention span, tech savvy Soft Stuff and My Body Ain’t Talkin’ Gartner Research Says The CISO… Source: Emerging Role and Skills For the CISO Gartner Report • Balances needs of the business with – Increased regulated controls – Increased complexity • Translates “technical speak” • Has a solid background – 5-7 Years Information Security – Additional IT Background • Thinks strategically, Politically Savvy • Knowledgeable of key aspects of business • Possesses certification “Techie” Core Competencies Analytical Problem Solving Tool Expertise Best Practices Industry Standards Technical Knowledge Team Work Emerging Technologies Crisis Mgmt Leadership Competencies Interpersonal Self-control Awareness Self-control Perseverance Adaptability Technical Competency Security/Audit/ Compliance Leadership & Managerial Competency Results-Oriented Flexibility Initiative Self-Development Critical Efficiency Orientation Information Seeking Thoroughness Non-Technical Core Competencies Financial/ Vision Budgetary Leadership Interpersonal Influencing Effectiveness Skills Customer Team Focus Work Conceptual & Written/Oral Strategic Communication Thinking Important Security Leadership Skills Self Confidence 65% Oral Communications 74% Written Communications 74% Influence 69% Teamwork 68% Source: Fitzgerald/Krause CISO Survey, CISO Leadership Skills, 2008 ISC2 Press Career Path Decision Point: Techie or CISO Differences In Thought Processes Technical • Technical challenge • Concrete non-ambiguous solutions • Task-oriented • Mastery of technical skill • Hands-on training focus • Documentation aversion • High level of individual contribution • Meetings are distractions Technical Expert Chief Information Security Officer Career Path Decision Point: Techie or CISO Differences In Thought Processes ? Managerial • Business relationships • People-oriented Technical • Consensus building Expert • Many presentations • Influence Chief • Team building Information • Accepting ambiguity and Security uncertainty Officer • Meetings, meetings, Meetings! • Oral communication with all organizational levels Let’s Assume.. We Are Creating A New Team Question #1 What Department Do You Want On Your Team ? Question #2 What Perspective Do They Bring ? Question #3 What Level of Individual Should Be Involved ? Soft Skills of The Security Leader Are Need To Manage The Team • Excitement • Trust building Forming Phase • Draw out opinions • Patience, permit dialogue Storming Phase • Doubt Surfaces • Team Divisions • Rules of behavior • Dissention critical Norming Phase • Role acceptance • Individual contribution respect • Team emerges • Focus on meaningful work Performing Phase • Functioning unit • Attention to deadlines • May regress • New members, new perspectives Communication To Executives– Present In Understandable, Organized Business Terms 2002 2003 2004 2005 2006 2007 How Does The Mobile Commuting Trend Impact Communications ? • “Office less” work-athome • Telecommuters • Road Warriors • Employees at work working in distributed environments • After hours work at home 41 12 Roadblocks to Effective Listening • • • • • • Comparing Mind Reading Rehearsing Filtering Judging Dreaming • • • • • • Identifying Advising Sparring Being right Derailing Placating Source: McKay, M How to Communicate: The Ultimate Guide to Improving your Personal and Professional Relationships Body Language • • • • • Not an exact science Facial expressions Touching Eye contact key aspect Enables better self-awareness and self-control • Several signals more reliable 6 Universal Facial Expressions • • • • • • Happiness Sadness Fear Disgust Surprise Anger Who Do You Think You Are? Who Are Those $%%#$! People That Work with Us? The 4 Dimensions of Personality Type How People Are Energized (E) Extroversion Introversion (I) The Kind of Information We Naturally Pay Attention To Intuition (N) (S) Sensing How We Make Decisions Feeling (F) (T) Thinking How We Organize Our World (J) Judging Perceiving (P) 4 Letters = 16 Different “Personalities” ISTJ ISFJ INFJ INTJ ISTP ISFP INFP INTP ESTP ESFP ENFP ENTP ESTJ ESFJ ENFJ ENTJ GETTING ENERGY:Outer World (Extraverted) vs. Inner World (Introverted) EXTRAVERTS (E) Seek Interaction Enjoy Groups Act or speak first, then think Expend energy Focus outwardly Talkative Energy! Like variety and action Outgoing Think out loud Enjoy discussing, Gregarious Breadth GETTING ENERGY:Outer World (Extraverted) vs. Inner World (Introverted) Introverts (I) Like to be alone Enjoy one-on-one Think first, then speak or act Conserve Energy Focus Inwardly Quiet Like To Focus on on thing at a time Reserved Think To Themselves Enjoy Reflecting Depth Spotting An Extravert or Introvert.. Introverted Enthusiastic demeanor Talk more, animated, faster, louder Easily distracted Change subjects quickly Seek center stage Interrupt and finish sentences Act first, think later Calm, measured demeanor More reserved, talk less Think, then talk, slower Focus their attention Stay with one subject at a time Shun the limelight Cautious and hesitant Like to spend time alone GATHERING INFORMATION: Sensing(S) or Intuition (N) Sensing (S) Prefer facts Concrete data Actual Pay attention to specifics Practical, realistic, “down to earth” Present focus Value common sense Pragmatic Intuition (N) Prefer insights Abstract information Theoretical, possibilities Focus on big picture Inspired, imaginative, “head in clouds” Future focus Value innovation Speculative Sensing and Intuition Clues: The Forest or The Trees ??? Intuition Sensing 65% of population Clear, straightforward speech Sequential thoughts Literal, facts examples More aware of bodies Attracted to practical jobs Prefer nonfiction reading Remember past accurately Listen until others complete thought Sensing and Intuition Clues: The Forest or The Trees ??? Intuition Sensing 35% of population Complex speech compound sentences, Roundabout Thoughts Figurative, metaphors, analogies Attracted to creative jobs Prefer fiction reading, Graduate Degrees Repeat themselves, rephrase Talk about big picture, Envision Future Finish others sentences MAKING DECISIONS:Principles (Thinking) or Values (Feeling) ? Feeling (F) Thinking (T) Firm-minded Objective, convinced by logic Laws, Justice, Policy Analytical, Clarity Decide with their head Some view as insensitive Good at critiquing Detached, Direct Don’t take things personally Gentle-hearted Subjective, convinced by values Humane, Social Values Appreciative, Sympathetic Decide with their heart Some view as overemotional Good at appreciating Involved, Harmony, Tactful Usually take things personally Finding the Thinker.. Pros and Cons Cooler, more distant May be blunt, tactless, insensitive Businesslike, get to the point More “thick skinned” Appear low-key, matter-of-fact Give praise sparingly Assertive, impersonal language Often engaged in jobs of strategy May argue, debate for fun 65% chance they are male Finding the Feeler, How Others Are Affected? Warmer, friendlier Sensitive to feeling, gentle, diplomatic Engage in social niceties Engage in small talk first Appear excited, emotional Generous with praise Lack assertiveness “Value” words, lots of them Often in helping jobs 65% chance they are female ORGANIZING OUR WORLD AND LIVING OUR LIVES:Planning It (J) or Letting It Happen (P) Judging (J) Seek closure, things settled Value structure, goals Plan ahead Like order, scheduled Work now/play later Enjoy completing projects More Structured Perceiving (P) •Seek openness •Value the flow, Adapt •Like flexibility, tentative •Process-oriented •Spontaneous •What deadline ? •Play now/work later •Like to start projects •More easygoing •Flexible Spotting The Judger Judging Formal, conventional, serious Quick Decisions Perceiving Take charge, in control,in a hurry Dress more for appearance, straighter posture Neat car interior Like rules, systems, structure Make lists, organized Straighter posture, walk faster Seek jobs that give them control Tidy, neat workplaces Spotting The Perceiver Casual, unconventional MoreJudging playful, good at adapting Procrastinate, put off decisions Leisurely place Dress for comfort, may slouch Messy car interior Rules, systems are confining Make lists, seldom finish May walk slower Seek jobs that are fun Perceiving Putting It All Together… ISTJ LIFE’S NATURAL ORGANIZERS ISFJ COMMITTED TO GETTING THE JOB DONE INFJ AN INSPIRING LEADER AND FOLLOWER INTJ LIFE’S INDEPENDENT THINKERS ISTP JUST DO IT ISFP ACTION SPEAKS LOUDER THAN WORDS INFP MAKING LIFE KINDER AND GENTLER INTP LIFE’S PROBLEM SOLVERS ESTP MAKING THE MOST OF THE MOMENT ESFP LET’S MAKE WORK FUN ENFP PEOPLE ARE THE PRODUCT ENTP PROGRESS IS THE PRODUCT ESTJ LIFE’S NATURAL ADMINISTRATORS ESFJ EVERYONE’S TRUSTED FRIEND ENFJ SMOOTHTALKING PERSUADERS ENTJ LIFE’S NATURAL LEADERS Source: Type Talk At Work, Otto Kroeger with Janet M.Thuesen Effective Communicaton Appreciates and Leverages The Differences E S T J Tailored Security Message I N F P Obama and Romney (or is it Romney and Obama) Are The Only Ones Who Care About Politics… Or should We ? THE WHITE HOUSE NEEDS A SECURITY GUY VOTE FOR TODD... OR AM I TOO LATE? Just Like The Winchester House… “All organizations are perfectly aligned to get the results they get.” - Arthur W. Jones, The 8th Habit By Steven Covey. EVERY Organization Has A Culture, Intentional or Accidental Geography Collaboration Trust Level Hierarchical Bureaucratic Hidden Agendas A C L U I L G Strategies T N U M R E E Action Plans N T Vision Lead By Edict Or Example Cost Cutting Vs Innovator Risk Appetite Celebrate Teams Or Individuals Company Size Industry How Much Do You Know About Your Organization ? • Who talks to whom? • Who talks first? For how long? What are their agendas? • Who are the insiders? • What are their views? What stories do they share? • How do people around you get things done? • What are their motives and attitudes on work issues? Source: It’s All Politics, Kelley Reardon How Much Do You Know About Your Organization ? • Whose side are they on and is it yours? • What inconsistencies are in their words and behaviors? • That types of behavior are rewarded and by whom • What organizational fictions are passed around, and what happens to people who buy into them ? • Are you on the inside track? Source: It’s All Politics, Kelley Reardon Key Savvy Behaviors • • • • • • • • • • Be aware Establish long-term goals Establish at-the moment goals Develop allies Offer favors, pay back favors Build an organization Be a good team player Know your legend Be resilient Have a meeting before the meeting • • • • • Make your boss look good Share the glory Pick your battles wisely Get a reputation Get in the information loop • Don’t confuse the company with your family • Depersonalize Source: Ciso Leadership Skills: Essential Principles for Success Fitzgerald/Krause (2008), How Savvy Are You? Billi Lee Matching Response to Personality PERSONALITY Forceful YOUR RESPONSE Speak with conviction Brusque Down-to-earth Antsy Perfectionist Irascible Charming Sensitive Hands-on Brief comments to hold attention Practical data and examples Provide reassurance not problems Assure loose ends considered and dealt with Choose timing carefully before request Enjoy their repartee Avoid drawing attention to shortcomings Demonstrate your ability to roll-up sleeves and do what is needed Ironclad data, don’t focus on feelings Insecure Communication Final Thoughts • Communication has many dimensions – Generations – Soft Skills/Body Language – Personality hard-wiring – Political Skill • Develop strengths; mitigate weakness • Get feedback [email protected] [email protected] www.linkedin.com/in/toddfitzgerald Thanks For Your Participation!!!! Available Jan 2012 at Amazon & Barnes & Noble Collaborate – Contribute – Connect http://www.isaca.org/Knowledge-Center The Knowledge Center is a collection of resources and online communities that connect ISACA members – globally, across industries and by professional focus - under one umbrella. Add or reply to a discussion, post a document or link, connect with other ISACA members, or create a wiki by participating in a community today! This is a pre-publication draft of Chapter 12 for the book Information Security Governance Simplified: From the Boardroom to the Keyboard by Todd Fitzgerald (Auerbach, 2012). The complete book may be ordered from Amazon.Com or Barnes and Noble websites. 12 EFFECTIVE SECURITY COMMUNICATIONS The meeting of two personalities is like the contact of two chemical substances: if there is any reaction, both are transformed. Carl Gustav Jung, 1875–1961 Why a Chapter Dedicated to Security Communications? If the phrase security communications conjures thoughts of the network, protocols, blocking, terminating communications, ensuring messages get from point A to point B intact, and must be available 24/7, you are correct. However, the topic is not about computer communications but rather human communications. Information security governance depends upon humans to deliver the right message to the right individuals at the right time in the right manner for the messages to be heard and acted upon. Imagine for a moment that the information security department creates a plethora of security policies representing the equivalent of creating the Mona Lisa to an artist or creating a team of athletes that wins the Super Bowl. Imagine then that what would have happened if no one had ever seen the Mona Lisa that was stored in an attic or the team that was capable of winning the Super Bowl never showed up for its games? A similar fate can fall upon the information security program if information security policies, ideas, and initiatives are not properly communicated. True information security governance may look good on paper, with policies drafted and technical solutions appearing to be in place, but if these are not communicated properly, security governance is really not occurring. 305 .LQGE 30 306 IN F O RM ATI O N SEC U RIT Y G O V E RN A N C E SIM P LIFIED Security communication takes on many forms such as the publishing of information security policies, selling the next information investment to management, explaining the current status of security audit issues to the board of directors, crafting security e-mail messages of the latest security concerns, or simply having a conversation about a security issue with a security colleague or business unit manager. It should be clear that every communication by every individual associated with the information security team has the potential to either (a) provide increased credibility and support to the information security program or (b) cause the information security area to be viewed as a roadblock or lessen trust that the security group has the organization’s best interests front and center. Communication skills are constantly evaluated as we are growing up—from formal penmanship, written communication skills, listening skills, plays well with others, and speaks up when called upon as a child to the formal performance reviews where written and oral communication skill competencies are evaluated on an annual basis. The continuous evaluation of these skills indicates the importance of them. After all, how effective can we be in the workplace if we cannot effectively communicate with others? Hence, due to this importance, this chapter is dedicated toward how security professionals can improve their communication skills to convey the appropriate security messages throughout the organization. Different aspects of communication are explored and by understanding the different communication styles that are occurring within the company, the security executive and professional can be more effective in constructing and delivering the appropriate message. End User Security Awareness Training One of the debates over the past decade has been whether information security awareness training has been effective. Much of this concern is generally started from an analysis of the number of security incidents in a given year and then concluding whether the end users were receiving the message and acting in a secure manner in their day-to-day jobs. The conclusion then usually suggests that technical controls need to be implemented to take out the risk of “human error.” Unfortunately, these conclusions are made without the benefit of a scientifically controlled experiment, whereby the “test group” of users .LQGE 30 E F F EC TI V E SEC U RIT Y C O M M U NI C ATI O N S AU: Does “they” refer to the test group? 307 of the same organization received no security awareness training were evaluated against a “control group” in which they were to determine whether there would have been more or less incidents experienced by the control group. Obviously, technical controls are very important to the information security program, and are necessary to address the aspects such as antivirus, encryption, firewalls, security mechanisms, physical security, authentication, and monitoring, but given that technical controls cannot fully address the end-user behaviors, security awareness training must be in place to reduce the risk. Information also comes in nontechnical forms (oral and paper documents) that cannot be secured by technical means or without the diligence and assistance of the end user. For example, a policy may state that all documents transported between the office and home need to be transported in a locked container. If the end user is not aware of the policy or does not understand the rationale for the policy, she might decide it is not necessary and not place the documents in a locked box. Alternatively, an individual may load boxes of documents in his car in the wintertime, leaving the engine running to keep it warm while hr runs back into the house to retrieve more boxes for loading. Meanwhile, the end user may be taking an increased risk that the car will be stolen and the confidential documents exposed. Since there are no technical controls to prevent this (other than the end user locking the door in between trips), security needs to be continuously reinforced with the end user to reduce the risk of this type of error. Awareness Definition Security awareness training is different from security training. The National Institute of Standards and Technologyy (NIST) provides the AU: Where is definifollowing definition: tion from? Web site? Document? Awareness is not training. The purpose of awareness presentations is simply to focus attention on security. Awareness presentations are intended to allow individuals to recognize IT security concerns and respond accordingly. In awareness activities, the learner is the recipient of information, whereas the learner in a training environment has a more active role. Awareness relies on reaching broad audiences with attractive packaging techniques. Training is more formal, having a goal of building knowledge and skills to facilitate job performance. .LQGE 30 308 IN F O RM ATI O N SEC U RIT Y G O V E RN A N C E SIM P LIFIED In short, the basic objective of security awareness training is to (1) provide enough information to the end users as to what they and others should and should not do and recognize what would constitute a security incident, and (2) know what they should do if they recognize or suspect that a security incident has occurred. If these two objectives have been met, then the information security awareness program has been successful. Delivering the Message Information security programs fall short of the message when the security message is not crafted in a manner that grabs the end users’ attention or fails to provide them with the necessary information. Let’s face it, many security people progressed to higher levels within the organization due to their technical abilities, not based upon their communication or marketing skills. Providing information security awareness is essentially marketing—inducing the recipient of the message to buy something (in this case buy into) what they ordinarily may not have thought to buy on their own. Savvy marketers craft the message not in pages of boring technical, jargon-filled presentations, but rather in short, high-impact, sound-bite type messages that grab our attention and are retained. Security professionals must do the same. The following seven steps, adapted from NIST security awareness guidance, provide a process for delivering an effective information security program. Step 1: Security Awareness Needs Assessment Assessing security awareness is often an overlooked step when first implementing a security awareness program. Without knowing where the highest risk areas or areas that have been causing the most incidents are, valuable time with the end users could be wasted. The needs can be determined from multiple sources, as described next. If the organization is rolling out a new identity management system or a new incident reporting process, this may be a good time to explain how this will work. Or a new law or regulation could mandate new reporting requirements that would need to be communicated. New or Changed Policies .LQGE 30 E F F EC TI V E SEC U RIT Y C O M M U NI C ATI O N S 309 Past breaches can provide a wealth of information from which to construct the security awareness program. These are also very useful in obtaining the end users’ attention, as it demonstrates that security issues are occurring within their organization versus a theoretical concept that “this could happen.” It also reduces the likelihood that the end user will think that the security department is sensationalizing the news. Care should be taken when presenting actual incidents within the company that it is not possible for the end users to deduce the person or in which department that the individual was working. This could cause some ethical and legal issues in disclosing personal human resource issues. The objective is to explain the incident so that the same type of incident does not reoccur through someone else’s behavior. Incidents of the same type that have a high number of occurrences would be excellent candidates for targeted security awareness training. Past Security Incidents Systems Security Plans Systems security plans (SSPs) document the current state of an information security system and can take the form of a major application (MA) or general support system (GSS). Since these plans define the overall business objective of the system, the infrastructure, and the managerial, technical, and operational controls required to support the system, these documents can provide excellent sources of the types of information that needs to be shared with the end users. For example, if there are many business partners that are part of the infrastructure, the end users may need to be made aware of which email communications are secure or what is permissible to discuss with the business partner due to intellectual property rights that are defined in the systems security plan. Audit Findings and Recommendations If there are recurring audit issues that have not been mitigated, these should be included in the security awareness training. Since auditors cannot audit 100% of everything, samples are taken that represent a statistical significance if an issue is found. The issues found may or may not have occurred across every department; however, that does not mean that the issue is not broader than the audit issue found. For example, the auditors may pull a sample of policies and procedures and determine that they have not been updated on an annual basis for a couple of departments. .LQGE 30 310 IN F O RM ATI O N SEC U RIT Y G O V E RN A N C E SIM P LIFIED Odds are, just as when a pest exterminator sees one mouse, there are likely to be many more, so is it likely that other areas have not been following the process of annual updates. Typically these are issues of security governance across the organization; the tone at the top has not made this a priority or there have not been the processes in place to monitor and ensure this is completed on an annual basis. Repeat audit issues should always be addressed either to a targeted group or broadly across the organization, depending upon the issue. Similar to security incidents, event analysis of the monitoring logs can highlight areas of concern. These are likely to evolve into targeted training more than security awareness training. For example, logs indicating that firewall vulnerability is repeatedly being exploited by external hackers may indicate the need to train the network group on device configurations. Event Analysis Industry Trends Introduction of new technology into the marketplace can provide a rich source for discussion. Discussing the use of social media in the workplace, such as Facebook, LinkedIn, or Myspace, will provide relevant discussion of issues that most end users can relate to. Alternatively a discussion of the use (or nonuse) of personal e-mail and the acceptable use policy to govern appropriate Internet behavior will be of interest to the end users. The security officer has to keep abreast of the current industry trends to ensure that the risks are mitigated, as new technologies are often released first and then security controls are added second. The reality of this situation is that products are usually in a race to become the first to capture market share and may not have implemented the necessary security controls. As an example, consider the evolution of the Windows operating system and how it took almost nine releases over a period of more than two decades to build-in many of the security concepts that are expected today. Managers should be polled to determine what issues they are aware of that need more focus. They may be concerned with documents not being properly disposed or laptops not being put away at the end of the day or securely transported. Management Concerns .LQGE 30 E F F EC TI V E SEC U RIT Y C O M M U NI C ATI O N S 311 After reorganizations, employees are oftentimes reporting to a new manager that may operate differently. This is a good time to reinforce the security concepts. Locations may have closed during the reorganizations or whole departments eliminated, thus creating potential changes in the security procedures. Organizational Changes Step 2: Program Design Communications can either happen through the best intentions or be designed. By approaching the security awareness program as something that must be designed, the chances of leaving out critical components are lessened. A car would not be produced without a design; a TV show would not be delivered without a script to guide the flow of the contents. A cliché in providing presentations is to know your audience. The security awareness presentation delivered to a group of airline mechanics may be different than to a group of customer service representatives. The analogies or stories used in the presentation to connect with the audience may be different. For example, relating the information security concepts of physical protection to ensure that no unauthorized people are in the hangar that could cause loss of life by tampering with the airplane engine parts may be effective with the airline mechanics. The customer service representatives may relate to the importance of verifying the caller with identifying information so as to not release confidential information to the wrong person. Alternatively, talking about sending faxes to the wrong healthcare provider would have little relevance to the airline mechanics. Target Audience Security awareness training should be performed minimally once a year and preferably during a time in the business cycle that will not cause an increased burden in meeting the company objectives. For example, having a training session for a group of accountants at fiscal yearend or right before tax season would not be welcomed. If face-to-face sessions are used, scheduling of the sessions needs to be planned so that there is ample time for individuals to plan the training into their schedules. Frequency of Sessions .LQGE 30 312 IN F O RM ATI O N SEC U RIT Y G O V E RN A N C E SIM P LIFIED Face-to-face sessions work best when the number is kept to 30 or less. A group of this size allows for interaction and more exchange of information between the participants. Schedules should be drawn up 6 to 8 weeks in advance of the training to ensure the greatest attendance and to obtain the appropriate facilities. Number of Users Face-to-face sessions work best, however, these are also time consuming, as multiple sessions are needed to cover the workforce in groups of 25 to 30 people. The security officer and his staff have to dedicate significant resources to this task, especially if the associates are spread out across multiple locations. As a result of cost reductions, some security departments have gravitated to online learning management systems to deliver PowerPoint-type contact to the end user. The difficulty with this approach is that users may simply click through the material without providing their full attention, which is much harder to do in an interactive security awareness session. Even though quizzes can be incorporated into the material to determine whether the end user was paying attention, it is difficult to ascertain if the end user was truly engaged. The more engaged the participants in the learning process, the greater the likelihood that the material will be retained. Method of Delivery The labor, materials, locations, and budget required for the program need to be reviewed. At this stage the full costs may not be known, however, the budget parameters should be determined. It would not be unreasonable to spend 1% to 2% of the information security budget on security awareness training and a greater percentage on a small budget. Resources Required Step 3: Develop Scope The security awareness program must be scoped or there is a risk that the message will be lost in delivering the training. Scoping utilizes the needs assessment captured in step 1 and determines what topics are provided. Once the scope of the training has been initially defined, the population that is required to attend Determine Participants Needing Training .LQGE 30 E F F EC TI V E SEC U RIT Y C O M M U NI C ATI O N S 313 or participate in the training needs to be defined. Depending upon the company desire or the law or regulation, all employees, including contractors requiring systems access may be subject to the training. If a subcontractor relationship exists with another firm that is performing work on the organization’s behalf, then it should be determined whether the subcontractor should provide its own security awareness training (as the subcontractors are employees or contracted to that firm) or should the company that hired the subcontractor require the security awareness training provided to its own employees. New hires present a special situation that must be addressed. The organization may require annual refresher training for the existing employees and contractors, but the new hires also need the security awareness training from day one. New hires should not be allowed access to the system until they have had some form of security awareness training. One technique that is very effective is to have the hiring manager provide security awareness training to the employee (e.g., in the form of a PowerPoint presentation); have the employee sign an attestation that they have read the security requirements, understand them, and will abide by them; and have the manager fax or e-mail the signed copy to the security administration or access management department or whichever department is responsible for account establishment. Once the fax or e-mail is received, then the department can release the login ID and password to the manager to provide to the employee. The employee would then log on and change the onetime password. In this manner, the new hire has the appropriate onboarding security awareness training that may not line up with the scheduled annual awareness training, which they would take during the next cycle with everyone else. Business Units Security awareness training is generally developed for the current cycle (i.e., annual training) and provided to everyone in the organization. However, there may be special situations where the training is customized to a particular department because of different concerns. Select Theme One of the most important aspects in designing a security awareness program is to select a theme for the training. A list of themes is shown in Table 12.1. This helps to focus the training around a subject and keeps the scope from drifting. Selecting a theme .LQGE 30 314 IN F O RM ATI O N SEC U RIT Y G O V E RN A N C E SIM P LIFIED Table 12.1 Security Awareness Themes Appropriate Internet usage E-mail security Social engineering Viruses, worms, Trojans, malicious code Identity Theft Incidents and incident response Tablet computing Need-to-know access Wireless security Copyright protections and licensing E-mail etiquette Clean desk policy Handling of protected health information or credit card data Latest information security events in the news Spyware Phishing attacks Confidentiality, information sensitivity Shoulder surfing Spam Smartphones Individual security responsibility Home network usage What is risk? Government regulations Laptop security Password management Protecting yourself and your company in a disaster Obtaining access to information does not limit the creativeness of the training, but rather permits the designer to build the program around a common concept while introducing other security-related items into the program. For example, while constructing a security awareness training program using the theme “Internet and Email Security,” the concepts of antivirus, confidentiality, non-sharing of passwords, encryption, phishing, and Web site malware can be introduced into the training. The common mistake is that the fire hose method of security awareness education is used, and all possible aspects of security are communicated during a 1 to 2 hour presentation or during a webinar. The end users eyes glaze over and little is retained other than “be sure to not let someone piggyback behind you when walking in the building” or “hit CTL–ALT–DELETE and Lock when stepping away from the computer.” The themed approach avoids this scenario. Step 4: Content Development Once the theme is chosen for the security awareness training, the content should be developed to be as impactful as possible to achieve the highest retention rate after training. Face-to-face training affords the ability to combine video, music, props, and attendee interaction to create an unforgettable learning environment (versus the twodimensional Internet training delivery mechanisms). Game shows, .LQGE 30 E F F EC TI V E SEC U RIT Y C O M M U NI C ATI O N S 315 use of online videos, and interactive skits to grab the participant’s attention work very well. Once the security awareness training grabs attendees’ attention, it is not uncommon to see that people enjoy coming to the sessions and are the first ones to sign up in subsequent years. Security awareness should be fun! One of the first places to start to build the security training session is to go to the toy store and the party store to buy some toys. As silly as this may sound, when people walk into the room feeling like they are about to play a game, their mood changes from “Is this going to be another boring security PowerPoint presentation?” to one of “Hey, this looks like fun!” Their curiosity takes over and as a result, they are more likely to pay attention. Security is a serious subject, but that does not mean that it has to be presented that way to be impactful. If the security professional is uncomfortable with giving presentations that appear silly or humorous, then another possibility is to enlist someone from corporate communications or marketing for support. Imagine being in the place of the end user that is required to attend mandatory awareness training. Programs should be constructed in such a manner that the end-user wants to attend the security awareness training. Step 5: Communication and Logistics Plan A one-page slide announcing the theme of the program should be developed as well as posters indicating the dates of the program. If multiple locations are part of the program, the poster could look something analogous to rock concert tour dates to generate interest. E-mails to the end users at least 1 month prior to the awareness session should be mailed, along with follow-up reminders at 2- and 1-week intervals. People are often very busy and may appreciate the e-mail reminders to sign up for the awareness session. Provisions for make-up signups should also be planned by scheduling one or two make-up sessions after the regular sessions have concluded. The e-mail reminders should stress promptness in attending the sessions. Each location should have signup sheets for the session to ensure that sessions are appropriately filled and do not exceed the size of the room. A good rule of thumb is to only have enough signups for five less than the capacity of the session. For example, if the room will comfortably seat 30 people in the session, then permit 25 to sign up. Why? Because .LQGE 30 316 IN F O RM ATI O N SEC U RIT Y G O V E RN A N C E SIM P LIFIED there will always be some individuals that will add their names below the line exceeding the capacity. This can cause problems if tables and exercises were set up for a group size of 25, but 30 show up. By planning for a maximum of 30 people, and allowing 25 to sign up with a 5-person contingency, there would be no problem if 30 people showed up. Travel arrangements to the various sites are also determined in this step, making reservations at least 30 to 60 days in advance to reduce the costs of the program. Step 6: Awareness Delivery Details at this stage are very critical, as the security awareness session should be managed as a production with contingencies for items that may go wrong. The trainer should arrive at the room location at least 1 hour before the start of the session so that the room can be set up in advance of people arriving for the first session. Items such as visual props, table arrangements, candy or food, evaluation sheets, and presentation copies need to be arranged around the room. The LCD projector and computer need to be tested to ensure the video, audio, and presentation operation are working correctly. Sessions should be no more than 1 hour, as the attention span starts to fade after 45 to 60 minutes. Sessions should also be scheduled 30 minutes apart to allow for (a) those individuals that arrive early to “get a good seat,” (b) those individuals that stay after the last session to ask one-on-one questions, and (c) set up for the next session. The trainer should be available at the start of each session to greet each person as they enter the room, and if the trainer is still running around setting up tables, projectors, and props, he or she will not be available. Greeting each person helps to make the program personable and starts the connection process, which increases the likelihood the individual will pay more attention. The delivery should be scripted, but be spontaneous at the same time. Each subsequent delivery can incorporate what worked and remove what did not work in the prior sessions. Sessions should start 5 minutes after the posted start time of the session and end 5 minutes prior to the end. Starting 5 minutes into the session accounts for the latecomers that would miss the start of the session. In high school, students have 5 minutes to get to their next .LQGE 30 E F F EC TI V E SEC U RIT Y C O M M U NI C ATI O N S 317 class, but once people get into the work world, they are faced with back-to-back meetings with no built-in travel time. Ending 5 minutes early provides time for them to fill out the evaluations. Step 7: Evaluation/Feedback Loops Evaluations provide insight into what is and is not working with the security awareness program. The quality adage “If you can’t measure it, you can’t improve it” applies to information security as well. Did the end users enjoy the training? Did they learn what was expected? Was there anything that could have been improved (content, logistics, delivery, understanding, etc.)? One method that is highly successful is to provide a trade of sorts, or an exchange, at the door as the attendees are leaving, exchanging a security trinket for an evaluation. They may place the evaluation facedown in the chair, but they do not receive the trinket unless they provide an evaluation. A small percentage will be blank; however this technique usually results in 95% to 100% return of the evaluations. The evaluations can then be tracked in a database by location, and assessments of the training can be performed. Numerical scores are tabulated (e.g., 4 out of 5 on a 5-point scale) and open-ended question responses are recorded. Quizzes several months after the training can be issued to determine whether the preceding training was effective. Security Awareness Training Does Not Have to Be Boring By injecting some creativity into the security awareness program, the training can be fun for the participants and fun for the creators. As a side benefit, engaging security professionals where this is not their daily role can broaden their own interpersonal and communication skills. The approach demonstrated in the aforementioned seven steps aides in the understanding and retention of the security message, which is the primary goal of creating a fun security awareness program. Targeted Security Training Security awareness training provides the broad security training that is sufficient for most of the organization. However, to ensure that the .LQGE 30 318 IN F O RM ATI O N SEC U RIT Y G O V E RN A N C E SIM P LIFIED proper skills are retained by the organization to carry out the implementation of the security policies, targeted training needs to be developed for certain groups, primarily those individuals managing others and those who are directly involved in an information security function. Security administrators need targeted training in areas such as Microsoft Active Directory, RACF, AC2, and UNIX administration to be able to set up and administer accounts correctly. Depending upon the level of the staff and the expectations, the depth of the training may vary. For example, the security administrator that is setting up accounts may need training on how to use the identity management system but not necessarily the technical details of Active Directory. On the other hand, the security analyst who is responsible for building automated queries and processes may need a seminar in Active Directory. Information security governance cannot occur if individuals are not competent within their assigned jobs. This does not mean that everyone needs the 5-day class, where a PowerPoint or 2-hour hands-on training session may suffice. Managers of employees and contractors typically require additional training, usually an hour or less PowerPoint or learning management system–type course to address issues such as access authorization using the identity management system and the handling on onboarding and terminations. During the on-boarding process, security awareness training, ensuring that background checks are completed, and providing the new hires initial access are subjects that may be covered. When the employee or contractor is terminated, the manager usually has some responsibility to enter information into the system and collect physical property such as badges, credit cards, laptops, and tokens. Communicating these requirements through training can reduce the risk that these activities are not occurring and increasing the exposure to the systems after the employee leaves the company. There are also specialized types of training depending upon the department that may need to occur, such as training of the handling of a customer care application, data center operations, and emergency response training. Not everyone in the organization would need to do what is required in the event of an emergency in the data center, such as a fire, however, the computer operators would need to know what to do to protect the data center and minimize the loss as well as how to safely evacuate. .LQGE 30 E F F EC TI V E SEC U RIT Y C O M M U NI C ATI O N S 319 Continuous Security Reminders A daily e-mail from the help desk explaining the latest security incident would cause most users to set up an e-mail filter to move this type of e-mail to the delete bucket. A balance of the security message must be achieved whereby when the users see an information security message, they are likely to read it and act upon it accordingly. E-mails of the latest incidents as applied to the organization can be very beneficial, especially if employees can relate to the issues in their own home environment. The breach involving Epsilon in 2011 where there was an exposure to the e-mail accounts of millions of customers to firms such as Chase, Citigroup, and Verizon, caused e-mail messages to be spammed and appeared to be coming from these organizations. This represented a great opportunity for organizations to communicate what was occurring and educate the end users about protecting their accounts. Since this occurred to many users as part of their personal computer involvement outside of work, this also has a side benefit of demonstrating the organization’s caring for the associate. These opportunities should be leveraged, which increase the likelihood of compliance to the security policies. Utilize Multiple Security Awareness Vehicles The potential avenues for security communication can fill a book by themselves. Some of the avenues for communication include: • • • • • • • • • • • • .LQGE Company newsletters Posters Learning management system online presentations Brown bag lunches Links on corporate intranet sites Weekly e-mails Logon page or scrolling marquee messages Hosting a “security day” Monthly, short three- to five-page presentations Online quizzes Online “scavenger hunts” Security contests 30 320 IN F O RM ATI O N SEC U RIT Y G O V E RN A N C E SIM P LIFIED Each of these methods should be considered as supplemental to the classroom-type training that is delivered face-to-face in person annually. Posters should also be used sparingly and typically in support of a specific security awareness campaign. Posters that utilize slogans tend to have limited lasting power beyond the campaign period. Posters can serve as a great advertisement for ongoing online training or classroom training, but by themselves have limited value. If posters are used, care should be taken to track where the posters have been displayed so that they can be removed in a timely manner. The messages should be impactful and address different security concerns beyond the “don’t share your password” type of message. Relating the security message back to how implementing security controls serves to protect the information for the customers that entrust their information to us can be very impactful. Security Officer Communication Skills Fill in chapAs discussed in Chapter X on information security management, t the AU: ter number. security officer must be able to interact with multiple levels off management. Oftentimes when employees respond to the first survey that an organization issues on employee satisfaction, a frequent issue that surfaces is lack of communication. What does this really mean? That the associate did not feel listened to? That their ideas were not acted upon? That there was not an avenue to provide input? That the manager or supervisor was not sharing relevant news in a timely manner? It could be any one or more of those items or something else. The security officer must be able to communicate with individuals in different levels of the organizational hierarchy, from the board of directors to the end users and everywhere in between. There are different personalities that must be communicated with, different styles of working and different ways that people deliver, receive, and process information. The subsequent techniques can improve the ability of the security officer or any security professional to communicate with others. Talking versus Listening Many people appear to believe that they are best communicating when they are talking, however, when we are listening and the other .LQGE 30 E F F EC TI V E SEC U RIT Y C O M M U NI C ATI O N S 3 21 person feels that he or she has been heard, our ability to communicate is much greater. Unfortunately, we block ourselves from effective listening by not paying full attention to the person speaking. Those who are good listeners tend to draw other people to them; people confide in them and they become a trusted member of the team. By not listening, it sends the message that what they have to say is not very important. Critical information is then missed and opportunities to demonstrate that the person is cared about is also missed. True listening involves providing our full attention. Roadblocks to Effective Listening There are 12 roadblocks that get in our way of effective listening, that make it hard for us to truly listen to what the other person is saying. g Because listening is so crucial in communications, we should continuously be aware of our behavior when another person is speaking. AU: Clarify “different situation is driving …” .LQGE 1. Comparing—While the other person is talking, you are trying to determine if you have had that situation before, and was it worse or not. They may be talking about an issue that you have had before, and the thought is running though your mind, “Hey, it isn’t that tough to complete that, why are they having a problem.” By comparing, it is difficult to listen to what their problem is, as the mind is busy analyzing our own past experiences. 2. Mind reading—Instead of focusing on what the person is saying, the listener is focused on trying to understand the meaning behind what they are saying and interpret a different situation is driving the comments. For example, they h may be saying “I have worked long hours to review these security violation reports, and I am tired of reworking them,” while the listener is thinking, “Oh, they just had a long day because they are going to school in the evenings and are probably just tired.” This may not be the case at all, and in fact the real issue is that the rework is preventing other work from being performed. 3. Rehearsing—The mind is too busy thinking of what the listener will say next, that they are not focusing on the message that is being delivered. In this case, the listener “appears” to be interested in what is being said. 30 322 IN F O RM ATI O N SEC U RIT Y G O V E RN A N C E SIM P LIFIED 4. Filtering—The listener listens just long enough to hear whether the person is angry, unhappy, or in danger. Once the emotion is determined, then the listening stops and focuses on other activities or plans that the person is thinking about. The listener only hears half of what is being said. 5. Judging—Judging occurs when someone is prejudged before they even start talking. A negative label is placed on the person who devalues what they may have to say. If the person is seen as unqualified, incompetent, or lacking necessary skills by the listener, they may discount what they have to say. This causes insights to be missed that could provide valuable insight to the solution. 6. Dreaming—When the talker mentions a thought that causes you to think of something in your own life that is unrelated to what they are saying, this is dreaming. They may be talking about what happens if the contract that the company is bidding on is not won, what will happen to the security staffing levels, but before they get to ask the questions, your mind has drifted off to the last company that you worked for that lost a huge contract and how you hated going through the reduction in force motions with your staff. 7. Identifying—Similar to dreaming, in this case every thing the person is telling gets related back by the listener to an experience in their own life. This is commonly shown when people are talking about a situation and then a similar situation is parroted back from the listener’s life. 8. Advising—In this scenario, the listener is too busy thinking of the solution to the problem from the first few sound bites that they miss important information or fail to pickup on how the listener is feeling. 9. Sparring—Quickly disagreeing by the listener causes the listener to search for items to disagree with. This can take the form of a put-down where the talker does not feel listened to and possibly humiliated. 10. Being right—This person will go to great lengths to demonstrate that they are right, including standing by their convictions, not listening to criticism, making excuses, shouting, and twisting the facts. .LQGE 30 E F F EC TI V E SEC U RIT Y C O M M U NI C ATI O N S 323 11. Derailing—The conversation is ended by changing the subject and avoiding the conflict. This is sometimes done by joking to avoid the discomfort of having to discuss the subject. 12. Placating—The listener is very agreeable, as you want people to like you, see you as nice, pleasant, and supportive. Listening may be at the level just enough to get the idea of what is being said, however, you are not fully engaged. By being conscious of these blocks, they can be avoided to become a better listener. There are also four steps to becoming a better listener, as discussed in the next few sections. Generating a Clear Message Effective oral communication depends upon generating a series of clear, straightforward messages that expresses the thoughts, feelings, and observations that need to be conveyed. Since over 90% of what we “hear” is not from the words, but from the volume, pitch, and rhythm of the message and the body movements, including facial expression, it is important that our messages are congruent. We cannot be verbalizing the need for a new, exciting security initiative with our posture slouched in the chair and expect the recipient of the message to be as excited as we are (or potentially not). Double messages should be avoided without hidden agendas. Over the long-term, hidden agendas serve to undermine the security department’s credibility. Influencing and Negotiating Skills Not everyone is going to automatically sign up for the information security initiatives, especially if this means spending money that could be allocated to other programs, involves an increase in the number of rules or adds perceived overhead to their business operations. To successfully negotiate when discussing a position, the security officer must be able to separate the problem from the individual. Direct attacks based upon prior experience with a particular department will not help gain its support. The key is to look at the security initiative that is being proposed from the perspective of the person that you .LQGE 30 324 IN F O RM ATI O N SEC U RIT Y G O V E RN A N C E SIM P LIFIED are trying to influence. It is also dangerous to try to read the other person’s mind as noted in the previous section and come to prejudged conclusions of their support or nonsupport of the project. It is OK to postulate in advance what the stakeholders may think about the situation to assist with the preparations; however, it is not prudent to come to foregone conclusions about their reaction. Consider various options to implementing a strategy that may be pliable to the stakeholder. There is always more than one way to perform something. A request by a business manager may be met with resistance by the security officer. However, by brainstorming various options, one of these solutions may be palatable, with some investigation, for both the business manager and the security officer. Once options are determined, these can be generated into requirements that are not demands but rather where the solution is mutually agreeable. Written Communication Skills Written communication takes on several forms in today’s word from e-mail, texting, twittering, social media (Facebook, Myspace, LinkedIn) posting, report writing, policy/procedure writing, and memo writing. E-mail is the predominant written form of communication and is much different than writing a memo or a policy and procedure. Care must be taken to know the audience and the purpose of the written communication. Although e-mail is a very quick method to communicate across the organization, it is amazing how many e-mails people send that have incorrect grammar, misspelled words, or use negative language. Since there is no tone button on the e-mail that is sent, words must be chosen carefully so as to not alienate the recipient. A simple request may turn into hurt feelings if not written in a clear, nonconfrontational manner. E-mails are also received almost as quickly as the send button is pressed, so extra care needs to be made taken constructing the message. Although it may be easy to become emotional over an issue, these are best handled by picking up the phone if they cannot be addressed using a fact-based, diplomatic written approach. .LQGE 30 E F F EC TI V E SEC U RIT Y C O M M U NI C ATI O N S 325 Presentation Skills Presentations come with the territory and security officers will find themselves in the position of having to deliver a presentation to senior management. Since management has limited time, presentations need to be focused with, “What do I hope to obtain or convey with this presentation?” Sometimes presentations will be an impromptu-type, such as the 30-second elevator speech, or it may be at the other extreme in the form of a memorized speech. Most presentations are combination of the two, whereby the presentation slides serve to guide the presentation, with much of the material being an impromptu delivery (albeit prepared) by the presenter. Presentation dos and don’ts are shown in Table 12.2. Table 12.2 Presentation Dos and Don’ts DO THIS DON’T DO THIS Know the audience: General end users? Technically oriented users? Management? Engage the audience by asking questions. Assume that the audience has the same level of understanding. Speak nonstop for 45 minutes or more (beyond the normal attention span). Exclusively using PowerPoint. Use a mixture of audio, video, and visual artifacts to make a point. Translate the technical issues by using analogies, stories, and relating to common everyday language. Make eye contact and use a friendly demeanor. Answer their questions using the no-dumbquestion rule. Ask questions early to get the audience engaged. If unsure of an answer, open the question up to the group. Leave time for questions and end the presentation 5 minutes early to permit time for attendees to make their next meeting. Focus on a few main objectives for the presentation. Keep the type text at least 24 font point. Speak with a microphone in larger rooms so the audience in the back of the room can hear. .LQGE Use technical security jargon when unnecessary. Read the presentation slide by slide or from note cards. Act superior to the questioner by failing to recognize their comments as valid, albeit they may be coming from a different perspective or disagree. Completely, but briefly, answer their questions. Lose credibility by talking about subjects that you have little experience with. Speak right up until the end of the hour and not get the conclusion or discussion of options completed. Provide histories (organization, computing) that are not related to the current discussion. Use graphics that are hard to see or are distracting (e.g., excessive use of animation). Assume that your voice is loud enough; some individuals may not be able to pick up the modulation properly. 30 326 IN F O RM ATI O N SEC U RIT Y G O V E RN A N C E SIM P LIFIED Applying Personality Type to Security Communications Ideas emanating from the early work of Carl Jung, a Swiss psychologist, were extended through the development of an instrument to indicate personality type differences by Isabel Myers and her mother Katharine Cook Briggs in 1943. This later became known as the Myers–Briggs Type Indicator, or MBTI, which has been taken by M millions of people. The MBTI is a very powerful tool, which at its simplest form breaks down all of the personalities into 16 types. Understanding each of these 16 types can help the security organization communicate more effectively with different individuals based upon their type. In other words, it helps to know how they may be wired to understand how they take in information, make decisions, where they get their energy from, and how they organize their lives. The Four Myers–Briggs Type Indicator (MBTI) Preference Scales The complete psychology explanation of the 16 types is well beyond the scope of this book, but there are many useful books written on the MBTI type noted at the end of this chapter. However it is useful to provide a brief primer on the 16 types and, more important, what the implications are for the information security department. There are four scales, with each person having a natural preference for one of the two opposites on each scale. While we all use each of the opposites at different times, one scale feels more natural to us most of the time. This natural tendency becomes our preference or the place where we are the most comfortable. The combination of the four scales, with two opposite values, yields 16 combinations of letters. Each set of letters yields a describable personality, not in a stereotypical manner, but rather a mechanism to explain the personality and what may be expected behavior, career interests, reactions to certain events, and so forth from that personality type. It is important to note that no “preference” is better than another, it is just different. Each of us uses all of the dimensions of preference at some point, and we flex our behaviors depending upon the situation. For example, an introverted parent may flex their extraversion when providing discipline to a child. .LQGE 30 E F F EC TI V E SEC U RIT Y C O M M U NI C ATI O N S Table 12.3 327 Where Do I Prefer to Focus My Energy (Inner or Outer World)? EXTRAVERSION (E)—TUNED INTO OUTER WORLD OF PEOPLE AND EVENTS INTROVERSION (I)—DRAWN TO INNER WORLD OF IDEAS AND EXPERIENCES Seek interaction Enjoy groups Act or speak first, then think Sociable and expressive Expend energy Focus outwardly Take initiative in work and relationships Like variety and action Outgoing Breath of information Like to be alone Enjoy one-on-one conversation Think first, then speak or act Think to themselves Conserve energy Focus inwardly Quiet, reserved Like to focus on one thing at a time Enjoy reflecting Depth of information The first preference is about where you prefer to get your energy: the external world (extraversion, E) or from the inside world (introversion, I). Extraverts tend to get energy from the people, interactions, and events, whereas introverts tend to derive their energy from their internal thought, feelings, and reflections. It is sometimes said that extraverts are processing information as they are talking, while introverts tend to crystallize the idea internally first before speaking. Introverts draw their energy from being alone, while the extravert may feel drained by spending long periods without interaction. Table 12.3 shows some of the characteristics of extraverts and introverts. Extraversion versus Introversion Scale This preference indicates how information is gathered. Sensing (S) individuals prefer to take in information through their senses, such as seeing, hearing, smelling, and so forth, to see what is actually happening. They are observant of what is going on around them and very good at determining the practicality of the situation. Information presented is preferred to be delivered in a very specific manner. Sensors tend to prefer to be presented with the facts and details of what they are reviewing. About 70% of the world prefers to gather information this way. Individuals that prefer to see the big picture to take in information most likely prefer intuition (N) to gather information. They focus on Sensing versus Intuition Scale .LQGE 30 328 IN F O RM ATI O N SEC U RIT Y G O V E RN A N C E SIM P LIFIED Table 12.4 What Kind of Information Do I Normally Pay Attention To? SENSING (S)—FOCUS ON CONCRETE, REAL, ACTUAL INTUITION (N)—FOCUS ON ABSTRACT, RELATIONSHIPS, PATTERNS Prefer facts, concrete data Value practical applications Present oriented Focus on reality, details, specifics Like step-by-step instructions Pragmatic Value common sense Prefer insights Value imaginative insight Future oriented Focus on the big picture, possibilities Like to jump around, move in anywhere Speculative Value innovation the relationship between various facts, facts that may not appear to have any relationship to the sensor. They are good at seeing new possibilities and new ways of doing things. Table 12.4 shows some of the characteristics of sensing and intuition preferences. How decisions are made is attributed to the decision-making preference, which has two ends of the scale, thinking (T) and feeling (F). Thinkers tend to look at the logical ramifications of a course of action. The goal of the thinker is to make a decision from an objective viewpoint and tend not to get personally involved in the decision. They are often called firm minded and seek clarity in the decision. They are good at figuring out what is wrong with something so that problem-solving abilities can then be applied. The feelers tend to approach decision making based upon what is important to them and to the other people. While the decision making of the thinker may gravitate toward what is right, lawful, or concludes with justice, the feeler may base the decision on personcentered values to achieve harmony and recognition of other individuals through understanding, appreciating, and supporting others. In short, feelers tend to prefer empathy over intellect. Table 12.5 shows some of the characteristics of thinkers and feelers. Thinking versus Feeling Scale Judging versus Perceiving Scale The last preference indicates the preference as to how you orient your world. Judgers (J) want to regulate and control life by living in a scheduled, organized, and structured way. They do not like things unsettled and want order in their lives. They enjoy their ability to stick to a schedule and get things done. For the judgers there is usually a right way and a wrong way to do things. .LQGE 30 E F F EC TI V E SEC U RIT Y C O M M U NI C ATI O N S Table 12.5 How Do I Make Decisions? THINKING (T)—ANALYTICAL, LOGICAL CONSEQUENCES, PRINCIPLED FEELING (F)—CONSIDER IMPORTANCE TO THEM, OTHER PEOPLE AND VALUES Firm minded Objective, convinced by logic Laws, justice, policy Reasonable Logical problem solvers Don’t take things personally Good at critiquing Gentle hearted Subjective, convinced by values Humane, social values Compassionate Assess impact on people Likely to take things personally Good at appreciating Table 12.6 329 How Do I Organize My World? JUDGING (J)—PLANNED, ORDERLY, CONTROLLED LIFE PERCEIVING (P)—FLEXIBLE, SPONTANEOUS, EXPERIENCE LIFE Seek closure, things settled Value structure, goals Scheduled, methodical Systematic Like closure and have things decided Avoid last-minute stresses Enjoy completing projects Seek openness Like flexibility, tentative Spontaneous, flexible Casual Like to have their options open, able to change Energized by last-minute pressures Enjoy starting projects Perceivers (P) prefer to be flexible and adaptable in different situations. They want to be able to be spontaneous and flexible to rise to the opportunity as it presents itself. They are called perceivers due to their ability to keep collecting new information, rather than draw premature conclusions on a subject. In other words, they prefer the open-endedness and ability to change their decision based upon new information. Table 12.6 shows some of the characteristics of judgers and perceivers. Determining Individual MBTI Personality Using the aforementioned descriptions and characteristics, by now it should be possible to determine your approximate MBTI or set of four letters describing your personality. This can be used as a guide for the next section in determining the individual temperament. The actual determination of the letters is more accurately determined by taking an assessment of the MBTI® by Consulting Psychologists Press, .LQGE 30 330 IN F O RM ATI O N SEC U RIT Y G O V E RN A N C E SIM P LIFIED containing more than 200 preference questions and determining the y In real life, we have to learn to approxiletters with more accuracy. mate the Myers–Briggs off our peers, unless we ask them if they know what theirs are, as they are not going to take a 200-plus question assessment for us! Over time, speed reading the types for individuals become easier and a very valuable tool for interacting with others. In an effort to distill the 16 types into commonalities for ease of discussion, David Keirsey portioned the 16 types into four temperaments by grouping the SPs, SJs, NTs, and NFs. Although there are individual differences due to the other two letters that make up each set of 4 letters (for an individual’s personality), there was a strong commonality within these groups, which simplifies the discussion of their temperament. Following is a brief description of some of the characteristics of personality types that fall into each of the four temperaments, along with the implications as to how security should be communicated with each temperament. For example, the SJ temperament consists of those individuals who have the ESTJ, ISTJ, ESFJ, or ISFJ personality preferences. For example, the ESTJ natural preferences are to obtain their energy from extraversion, gather information through sensing (concrete, detail-oriented), make decisions based upon thinking (logical, analytical values), and orient their world through Judging (schedule oriented, organized). The ESTJs share some common characteristics with the other SJs (ISTJ, ESFJ, ISFJ), even though they may vary on one of the other dimensions. The Four Temperaments SJ “Guardian” Temperament Those personality preferences shar- ing the SJ temperament (ESTJ, Supervisor; ISTJ, Inspector; ESFJ, Provider; ISFJ, Protector) share characteristics of being reliable, organized, task focused, and hard working at their best. At their worst, they may be perceived as being judgmental, controlling, inflexible, or close minded. They typically respect the laws and traditions of society, like to be in charge, have a standard way of doing things, expect others to be realistic, strive to belong and to contribute, have high expectations of themselves and others, are critical of mistakes and may fail to reward expected duties, have difficulty refusing to take on .LQGE 30 E F F EC TI V E SEC U RIT Y C O M M U NI C ATI O N S 3 31 other assignments, and do not like surprises. They are also good at anticipating problems. While people of any temperament can be successful at any job, there are some careers that attract this temperament more than others. The SJ temperament may choose careers as a project manager, regulatory compliance officer, budget analyst, chief information officer, bank manager/loan officer, government employee, administrative assistant, nurse, auditor, pharmacist, engineer, or an accountant. These are jobs typically involving adhering to a set of rules and standards without a large amount of ambiguity, which is attractive to the SJ temperament. SJs are also attracted toward positions that can create financial security. When communicating information security issues with the SJ temperament, it is important that if something was done wrong, that regret is expressed and a simple I’m sorry is used. This can set things straight and allow the SJ to move forward. SJs should be appreciated for their responsibility and willingness to handle the details of the situation in the form of compliments. For example, individuals in the security group managing the very detailed logging and monitoring may be of the SJ temperament as evidenced by their willingness to handle and organize the vast amount of detail. Commitments must be kept with SJs to win their trust. If the CEO is an SJ and there were promises made to implement a security initiative by the end of March so that a new product could be launched in May, the CEO who shares this personality type preference will most likely be less forgiving than the SP type, for example, when the deadline is not met. Communications with SJs should be specific and practical, as Dragnet’s Joe Friday would iterate, “Just the facts ma’am. Just the facts.” SJs are also resistant to change and need to be brought into change more slowly with logical reasons for the change. However, once the change has been embraced, they can be one of the strongest supporters of the change. The SP temperament (ESTP, Promoter; ISTP, Crafter; ESFP, Performer; ISFP, Composer) personality types may be viewed as the action seekers. They may be viewed as optimistic, generous, fun loving, adventurous, realistic, and adaptable at SP “Artisan” Temperament .LQGE 30 332 IN F O RM ATI O N SEC U RIT Y G O V E RN A N C E SIM P LIFIED their best, or hyperactive, impatient, impulsive, and scattered at their worst. They enjoy life in the here and now, highly value freedom and action, like risk and challenge, are spontaneous, may be perceived as indecisive, are observant, ask the right questions to get what they need, respond well to crisis, like short-term projects, and dislike laws and standard ways of doing things. This is sharp contrast to the SJ temperament previously discussed, which thrives on standards and ensuring that the rules are being followed. For career selections, the SPs tend to gravitate toward careers that permit them to experience life versus a means toward an end. Potential career choices for the SJ may include emergency room nurse, medical assistant, photographer, police officer, public relations specialist, fire/ insurance fraud investigator, news anchor, airline mechanic, marine biologist, or paramedic/firefighter. In the security field, individuals wanting the excitement of responding to a disaster recovery situation or an intrusion may gravitate toward this area. When communicating with the SP temperament, appreciation should be shown for their enthusiasm, common sense, and ability to deal with crisis. Joining in some of their activities may be appropriate, such as an invitation to meet them and a group of security vendors after work. Business executives of this type may be part of the golf club or bowling league, and this would be a good opportunity to network with these individuals and build rapport to create a nonadversarial environment. Given choices and alternatives, those sharing the SP temperament will want to do things their own way in their own timeframe. Issues should be pinpointed and overwhelming them with information avoided. They also do not like being told how to change or what to do. NF “Idealist” Temperament Those sharing the NF temperament (ENFJ, Teacher; INFJ, Counselor; ENFP, Champion; INFP, Healer), known as the ideal seekers, share the characteristics of being compassionate, loyal helpful, genuine, warm hearted, and nurturing at their best, or may be perceived as moody, depressed, or oversensitive at their worst. They are stimulated by new ideas, take an antiauthoritarian attitude, often side with the underdog, see possibilities in institutions and people, search for meaning and authenticity, self-actualize, .LQGE 30 E F F EC TI V E SEC U RIT Y C O M M U NI C ATI O N S 333 maintain close contact with others, give freely and need positive appreciation, and are good listeners. NF temperaments may gravitate toward jobs such as psychologist, sociologist, facilitator, career counselor, travel agent, human resources recruiter, teacher (health, art, drama, foreign language), social worker, or hotel and restaurant manager. When communicating with the NF temperament, cards, gifts, compliments and adoration go a long way. They are sensitive to criticism, so extra tact is necessary. Patience is needed to understanding of their need to express their feelings. Their support can be gained by appealing to their creativity and vision of their ideals. Individuals sharing the NT temperament group (ENTJ, Field Marshal; INTJ, Mastermind; ENTP, Inventor; INTP, Architect), known as the knowledge seekers, have strengths of being innovative, inquisitive, analytical, bright, independent, witty and competent at their best, or they may be perceived as arrogant, cynical, critical, distant, or self-righteous at their worst. They work well with ideas and concepts, value knowledge and competency, understand and synthesize complex information, anticipate future trends, focus on long-term goals, like to start projects (although not as good on follow-through), not always aware of other’s feelings, aim for mastery, and deal with the day-to-day details but have little interest in them. Knowledge seekers may be found as an executive, senior manager, personnel manager, sales/marketing manager, technical trainer, network integration specialist, technical writer, investment banker, attorney, psychiatrist, database administrator, credit analyst, technical project manager, architect, or Web developer/computer programmer. When communicating a security concern or initiative with the NT temperament, the security professional should attempt to appreciate their objectivity, quick minds, and knowledge. Since they value mastery in what they do, conversations that are intellectually stimulating should be pursued, feelings should be avoided in conversation, and debate with them, letting them know frequently you value their insights. Many of the technical staff involved in connecting patterns together, such as the network engineers or database administrators, NT “Rational” Temperament .LQGE 30 334 IN F O RM ATI O N SEC U RIT Y G O V E RN A N C E SIM P LIFIED can become supportive of the security program by simply asking them for their input and genuinely incorporating their insights into the security strategy and subsequent implementations. Summing Up the MBTI for Security Communication is so important and goes well beyond providing a written report or an oral presentation; it is how we interact with others on a daily basis. As the security program must remain credible to be effective, we must ensure that we are communicating the security messages clearly, and in a manner in which they will be heard. We tend to communicate by default by the manner that we are comfortable receiving. Unfortunately, and fortunately, we are not all the same, and we take in and process information differently. To be successful within the organization, the security officer and his or her team need to be able to communicate at an appropriate level with others within the organization. Understanding the differences in personalities will increase the effectiveness of the security message that needs to be delivered. References 1. McKay, Mathew, Davis, Martha, and Fanning, Patrick. 1995. How to communicate: The ultimate guide to improving your personal and professional relationships. New York: MJF Books. 2. National Institute of Standards and Technology (NIST). October 2003. Special Publication 800-50: Building an information security technology security awareness and training program. http://csrc.nist.gov/ publications/nistpubs/800-50/NIST-SP800-50.pdf 3. National Institute of Standards and Technology (NIST). October 1995. Special Publication 800-12: An introduction to computer security: The NIST handbook. http://csrc.nist.gov/publications/nistpubs/800-12/ handbook.pdf 4. Herold, Rebecca. 2005. Managing an information security and privacy awareness and training program. Boca Raton, FL: Auerbach. 5. Tieger, Paul D., and Barron-Tieger, Barbara. 1998. The art of speedreading people: Harness the power of personality type and create what you want in business and in life. Boston: Little, Brown and Company. 6. Tieger, Paul D., and Barron-Tieger, Barbara.1998. Do what you are: Discover the perfect career for you through the secrets of personality type. Boston: Little, Brown and Company. .LQGE 30 E F F EC TI V E SEC U RIT Y C O M M U NI C ATI O N S 335 7. Myers, Isabel Briggs, and Myers, Peter. 1995. Gifts differing: Understanding personality type, 2nd ed. Palo-Alto, CA: Davies-Black. 8. Kroeger, Otto, and Thuesen, Janet M. 1992. Type talk at work. New York: Tilden Press. 9. Bolton, Robert, and Bolton, Dorothy Grover. 1996. People styles at work: Making bad relationships good and good relationships better. New York: Ridge Associates. 10. Keirsey, David. 1998. Please understand me II: Temperament, character, intelligence. Del Mar, CA: Pometheus Nemesis. 11. Myers, Isabel Briggs.1993. Introduction to type, 5th ed. Palo Alto, CA: Consulting Psychologists Press, Inc. .LQGE 30 .LQGE 30 13 THE L AW AND I NFORMATION S ECURIT Y If you give to a thief he cannot steal from you, and he is then no longer a thief. William Saroyan, 1908–1981 Over the past several decades, and particularly in the last decade, there has been an increased focus on information security in concert with the fear that individual privacy could be compromised. As information has become more electronic and networks such as the Internet provide access points to personal computers and company computer networks, the attention of lawmakers has been raised. The fear is that this massive aggregation and interconnection of information will lead to exposures of sensitive information. Numerous laws have been put in place. In some cases, these laws overlap, adding to the complexity for the security officer attempting to build a one-size-fits-all information security program. The governance strategy must ensure the compliance with existing laws, as well as remain abreast of the emerging laws and regulations that are on the horizon. When the regulations are published, they come with a mandated compliance date and depending upon the size of the organization and the scope of the mandate, can be very time consuming to complete between the period of final law issuance and the required implementation. Therefore, it is in the best interest of the security officer to review draft regulations and proactively anticipate what types of requirements have a good chance of remaining in the final version of the law to provide more time to implement the new requirements. An added benefit of this approach is that by being well versed in the upcoming provisions, the security officer has the opportunity to provide input by way of comments to the proposal, usually within a 60-day period for federal regulations, to help shape the legislation. 337 .LQGE 30
© Copyright 2024